Answer: template
Explanation:
In order for each student to have a page layout that follows a consistent style, then the students should have a template.
A template refers to a predesigned document that can be used can to create documents without having to think about formatting. When a template is used, the margin size, spacing, font style, etc are predetermined.
What is the difference between business strategies and business models?
A. Business models focus on specific aspects of a business, while
business strategies focus on how different aspects affect the
whole business.
B. Business strategies include long-term business plans, while
business models include plans for daily business functions.
C. Business strategies focus on specific aspects of a business, while
business models focus on how different aspects affect the whole
business.
D. Business strategies incorporate forms of traditional business
advertising, while business models incorporate the use of social
media.
SUBMIT
Answer:
i think is B
Explanation:
The part of an HTML document where the CSS file is linked is the..?
A) body
B) footer
C) header
D) paragraph
Answer:
C) header
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head.
The head (header) contains information such as version of HTML, title of a page, metadata, link to custom favicons and cascaded style sheet (CSS) etc.
On the other hand, the body of a HTML document contains the contents or informations that a web page displays.
Hence, the part of an HTML document where the cascaded style sheet (CSS) file is linked is the header. A style sheet can be linked to an HTML document by three (3) main methods and these are;
I. External style.
II. Inline style.
III. Embedded (internal) style.
Q1. Which implementation of Network Access Control checks users' credentials to determine what level of access they should have to a top-secret file?
A. ACE
B. DAC
C. MAC
D. RBAC
Q2. Which physical access control uses a portable device that authenticates a person's identity electronically by storing some sort of personal information?
A. Infrared scanners
B. Hardware security tokens
C. Biometric devices
D. Keypads
Q3. Which implementation of Network Access Control grants access depending on a specific job role?
A. DAC
B. RBAC
C. MAC
D. PAC
Q4. Which implementation of Network Access Control is more relaxed, allowing users to determine file access privileges?
A. AAC
B. MAC
C. DAC
D. RBAC
Q5. Which type of access control sets the standard for the way security actions unfold?
A. Identity
B. Management
C. Physical
D. Technical
Answer:
1. MAC
2. Biometric Devices
3. RBAC
4. DAC
5. Management
Explanation:
Q.1) Option c) MAC
Q.2) Option c) Biometric devices
Q.3) Option b) RBAC
Q.4) Option c) DAC
Q.5) Option b) Management
What is MAC ?
The ability of individual resource owners to allow or refuse access to resource objects in a file system is constrained by the security measure known as mandatory access control (MAC).
What is a biometric device ?
An authentication and security identification tool is a biometric gadget.
What is RBAC ?
Role-based access control, often known as role-based security, is a method for only allowing authorized users to access a system.
What is DAC ?
The idea behind discretionary access control is to limit access to things based on who the subject is.
Therefore, MAC, biometric device, RBAC, DAC and Management access control sets are some of the measures for network security and access control.
You can learn more about network security from the given link
https://brainly.in/question/33317398
#SPJ2
Gretchen wants to avoid
Answer:
...Having uncomfortable conversations with her parents
...Getting pregos before 19
...Triping on the curb and falling on her face
...saying a curse word because she will get canceled
Explanation:
is monitor is a television
Answer: Can you rephrase the question
Explanation:
Select the correct answer.
A student is browsing a website. While browsing, he clicks on a link that takes him to another website. Which code gives the correct format of the
external link?
Answer:
(B) because on a website IT HAS TO HAVE "WWW." first
why people shouldnt get married
Abdul wants to create a header for a webpage and enters this line: Welcome to Abdul’s webpage! , but the title is smaller than was expected. What is the problem? There is too much text for HTML to treat it as a header. Headers need to begin with the tag. The first tag should not have a slash. Headers cannot contain exclamation points.
Answer:
I think H1
Explanation:
because h1 can make the letters begger
Answer: The first tag should not have a slash.
Explanation:
Question Mode Matching Question Match the following description with the appropriate programming language generation. 1GL 1GL drop zone empty. 2GL 2GL drop zone empty. 3GL 3GL drop zone empty. 4GL 4GL drop zone empty. 5GL 5GL drop zone empty. Extremely advanced. Uses statements (scripts) rather than algorithms. High-level programming language. Uses a compiler to convert into machine language. Machine language. Represented by a series of 1s and 0s. Assembly language. An assembler converts 2GL into machine language. Specifically designed for creating database management programs.
Answer:
1GL: Machine language. Represented by a series of 1s and 0s.
2GL: Assembly language. An assembler converts 2GL into machine language.
3GL: High-level programming language. Uses a compiler to convert into machine language.
4GL: Specifically designed for creating database management programs.
5GL: Extremely advanced. Uses statements (scripts) rather than algorithms.
Explanation:
Programming languages started as a series of binary digits (i.e. 0's and 1'). This generation of language is referred to as the first generation.
However, the machine language were difficult to read by human, so mnemonics were created (i.e. assembly language). This language uses symbolic codes such as ADD for addition, etc. This is the second generation
The third generation are the high level languages that uses languages that can be easily understood by human, e.g. + means plus. However, the language must be translated; hence the need for a compiler or interpreter, as the case may be.
The fourth and fifth generations are extensions of the third generation languages. The fourth were created to connect to DBMS while the fifth are more advanced.
What
are the
difficulties associated with the machine level and assembly
languages ?
Answer:
kalo cha
Explanation:
tero bau ra tesko
Which media example would be best for mayas presentation
Answer: c. a diagram that explains the steps involved in photosynthesis
Explanation:
The best graphic to use would be one that explains the processes involved in the process of photosynthesis. The best option is therefore the third one as it would actually show useful information on what photosynthesis is and how plants use it to get energy.
The first option would not educate anyone on what photosynthesis is as it does not talk about the process. The second and fourth options are the same.
does anyone know how to skip the video on e2020?
You can’t.
You can usually skip the last 10-20 seconds. If you click on the button that says next repeatedly you can skip a few seconds. That’s the most you can do though :/
Answer:
you can't
Explanation:
1.This check tests whether the data obeys specified criteria.Immersive Reader
Format check
Consistency check
reasonableness check
Data type check
Noah would like to center and underline the title. Which of the following steps should Noah follow?
Type the title, select the underline command, and select the centering command.
Type the title, highlight the text, and select the centering command.
Type the title, highlight the text, select the underline command, and select the centering command.
Type the title, drag across the text with the mouse, and select the underline command.
Answer:
Option 3 - Type the title, highlight the text, select the underline command, and select the centering command.
Network Address Translation (NAT) technology provides a major benefit for which of these network problems
Answer:
Address being exhausted
Explanation:
Network Address Translation (NAT) technology is a technology which has been very beneficial to the IPv4 network systems.
Its major function is that it provides a whole lot of options and ensures that the address isn’t exhausted. This difference sets the IPv4 system apart from other systems whose addresses got exhausted and led to the creation of the IPv4.
39 POINTS !
Okay so basically I have a 60 percent keyboard, and it’s LED perfect in shape jkeyboard okay.
I try connecting it to my ps4 and it’s detected but it won’t light up nor will any of the keys respond.
I have tried resetting my ps4
Iv’e tried unplugging and replacing in
I’ve tried holding FN and N to disable the n rollkey
I be tried plugging it into a pc
But nothing wors does anyone know how to fix it?
Answer:
Contact a service center electronics managementAnswer:
take it back to the store with your the receipt and get a new one
What do you suggest for Father's Day?
(Occurrence of max numbers) Write a program that reads integers, finds the largest of them, and counts its occurrences. Assume that the input ends with number 0. Suppose that you entered 3 5 2 5 5 5 0; the program finds that the largest is 5 and the occurrence count for 5 is 4. Hint: Maintain two variables, max and count. max stores the current max number and count stores its occurrences. Initially, assign the first number to max and 1 to count. Compare each subsequent number with max. If the number is greater than max, assign it to max and reset count to 1. If the number is equal to max, increment count by 1. Sample Run 1 Enter an integer (0: for end of input): 3 Enter an integer (0: for end of input): 5 Enter an integer (0: for end of input): 2 Enter an integer (0: for end of input): 5 Enter an integer (0: for end of input): 5 Enter an integer (0: for end of input): 5 Enter an integer (0: for end of input): 0 The largest number is 5 The occurrence count of the largest number is 4 Sample Run 2 Enter an integer (0: for end of input): 0 No numbers are entered except 0 Class Name: Exercise05_41
Answer:
Following are the code to the given question:
#include <iostream>//header file
using namespace std;
int main() //main method
{
int n=0,a[1000],c=0,val=10,ma=0;//defining integer variable
cin>>val;//input value
while(val!=0)//defining while loop that checks val is not equal to 0
{
a[n++]=val;//add value in array
cout<<"Enter an integer (0: for end of input):";//print message
cin>>val;//input value
}
for(int i=0;i<n;i++)//loop for finding the maximum in the array.
{
ma=max(a[i],ma);//holding max value in ma variable
}
for(int i=0;i<n;i++)//loop for counting the occurence of maximum.
{
if(a[i]==ma)//use if to check maximum value in array
c++;//incrementing count value
}
cout<<"The maximum value is "<<ma<<" The count of maximum value is "<<c<<endl;//print result
return 0;
}
output:
Please find the attachment file.
Explanation:
In this code inside the main method, an integer variable is declared that input values and use while loop to check first input if the value is true it will accept value from the user and adds in the array.
In the next step, two for loop is declared that checks the max value and in the next loop it will count the number of maximum value which is occurring.
why is this code giving me syntax errors on the colons and on print
print("Press enter to start program")
mark = input()
speed = int(input(Enter Mark")
if mark = >60+
print("Passed")
elif 1 <= mark >= 40:
print (“FAILED")
Answer:
Explanation:
You did not give double quotations in Enter Mark part
you did not give colon in if mark = > 60 :
Searching for Venom !!
help me find him lol
Answer:
Venom is widely distributed taxonomically, being found in both invertebrates and vertebrates; in aquatic and terrestrial animals; and among both predators and prey.
Explanation:
[tex] \red{hope \: u \: find \: venom \: asap}[/tex]
Explanation:
[tex]are \: you \: searching \: for \: me \: [/tex]
Identify the error and write correct HTML program 5
Cyber Bullying Tips<\head>
Don’t Respond Talk to a trusted adult
<|html>
Answer:
1. <BODY background = ‘‘red”>
2. <FONT type =‘‘arial ”>
Explanation:
Answer:
<html>
<head> Cyber Bullying Tips </head>
<body>
Don't Respond, Talk to a trusted adult
</body>
</html>
Hope this helps!
You have been asked to install a WLAN for a small business. You centrally locate the WAP in a large room that contains about 15 cubicles where employees work with their mobile devices. You test connectivity from all locations and find that signal strength is good throughout the room. Several months later, you are called to troubleshoot connectivity problems at the site. You find that the large room was divided into two smaller rooms by a floor to ceiling wall with metal studs. What is the most likely reason for the connectivity problems
Answer:
interference
Explanation:
The most likely reason for the connectivity problems is interference. This interference can be caused by many factors but in this scenario the most likely factor would be the metal studs and all the metal used to create the ceiling/floor. Metal is a huge interference when it comes to wifi signals. Depending on the type of metal and the amount it can greatly diminish the signal strength or even completely prevent the signal from passing to it's destination, regardless of how close the destination device is located.
Outline the dangers arising as a result of using computers
Answer:
Visual impairment
Physical Health problem
Explanation:
The benefits of computers are so numerous a d has been an essential business and educational tool every organization must possess for one purpose or the other. Such is how immense its importance is. However, the computer also comes with it's own risk, which may include :
Visual impairment is a major problem most computer users face or will likely encounter in the future due to prolonged exposure of the eyes to the light emanating from the screen. This visual challenge is populary called the. Computer Vision Syndrome.
Similarly, related health related issues affecting the physical body such as the back, hip, neck pains which result from postural position when using the computer.
a DVD looks just like a CD, but it holds less information true or false
Answer:
False
Explanation:
A DVD can hold more information because it is basically a double sided CD where it gets information on both sides whereas on a CD, you only read one side. On CDs, people can put stuff like stickers or whatever on one side while the important side is uncovered.
Question 3
There was a thunderstorm in your area and the power went out.
The traffic lights are not functioning.
• What is the first thing the law requires you to do when you arrive at an intersection?
Explain what you should do if there is an officer directing traffic.
.
The Answer Should Be:
The first thing for you to do when you arrive at an intersection is to stop at the traffic light. Your going to want to listen to the instructions or signals of the traffic Police.
I Hope This Helps? :)
the computer that communicate with each other are called ______please ask the answer in 15 minutes after 1 p.m.
The computers that communicate with each other are called [tex]\sf\purple{transmission \:control\: protocol\: (TCP)}[/tex].
[tex]\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{!}}}}}[/tex]
Type the correct answer in each box. Spell all words correctly. What is the name of the process of checking the client's production environment to ensure software and hardware compatibility with new products? The process of checking the client's production environment to ensure software and hardware compatibility with new products, is known as .
Answer: Software testing
Explanation:
Software testing refers to testing for the compatibility of the client's device with the software or hardware product being offered.
In order for the client to be able to use the software, it needs to be compatible with both the software already in the client device as well as the hardware. If it isn't, the product will not be able to add much value to the client's device which would mean that it is not fulfilling it's required functions.
Using filtering as a strategy to deal with information overload requires Group of answer choices reviewing all unsolicited information presented. determining what information you may need and what information merits attention. using Wikipedia to verify information. disconnecting from sources of information completely. requesting references for all undocumented information.
Answer:
The answer is "Choice B"
Explanation:
Please find the complete question in the attached file.
A filter is a tool for removing undesirable parts. Eliminate solid from a fluid, for example. The filter may mean the filter action: it could be used as a verb. When the filter is mentioned, various branches of science and technology often refer to a certain type of device. Filtering tries to decide the data you need and the data you have to address the overload.
It is good for your eyes to look away from your computer screen (look at something far away) at least once an hour
Help please!!!!! Drivers ed
Answer:
Away from the curb
Explanation:
by turning your wheels away from the curb if your breaks fail your car will roll back into the curb instead of into traffic.